Security
Three key aspects of being a threat hunter
In today’s digital landscape, the role of a threat hunter has become indispensable. As cyber threats grow increasingly sophisticated, the need for professionals who can…
![Reimagining Cyber podcast: 100 episodes strong](https://blogs.opentext.com/wp-content/uploads/2024/06/Reimaging-Cyber-100-Blog-image-341x192.png)
Reimagining Cyber podcast: 100 episodes strong
Reimaging Cyber is 100 episodes old! To celebrate how far we have come, let’s take a look back at where it all started and how…
• 3 minute read
![Are you ready for a cyberattack?](https://blogs.opentext.com/wp-content/uploads/2024/06/opentext-image-blog-IPS-security-services-1200x675-en-341x192.jpg)
Are you ready for a cyberattack?
In today’s digital age, cybersecurity threats are an ever-present danger for organizations of all sizes. While sophisticated technology solutions are critical in defending against cyber…
• 4 minute read
![Securing AI Deployments: Striking the Balance](https://blogs.opentext.com/wp-content/uploads/2024/05/shutterstock_1818554999-1200x675-1-341x192.png)
Securing AI Deployments: Striking the Balance
The recent IT leaders CIO MarketPulse survey by Foundry underscores that data must be ready for AI. If it’s not accurate, accessible, and secure, organizations…
• 8 minute read
![Unlocking AI potential for CISOs: A framework for safe adoption](https://blogs.opentext.com/wp-content/uploads/2024/05/shutterstock_2276152811-1200x675-1-341x192.png)
Unlocking AI potential for CISOs: A framework for safe adoption
Many organizations are in the exploratory phases of using Artificial Intelligence (AI). Some of these AIs include machine learning (ML), and natural language processing (NLP)…
• 7 minute read
![The new wave of channel marketing: What partners can expect in H2 2024](https://blogs.opentext.com/wp-content/uploads/2024/05/shutterstock_792158590-1200x675-1-341x192.png)
The new wave of channel marketing: What partners can expect in H2 2024
We’re well into 2024 now and the channel marketing landscape continues to change, thanks to a blend of innovation and connectivity. At OpenText™, we’re not…
• 5 minute read
![Unlocking insights: highlights from the 2024 Verizon Data Breach Investigations Report (DBIR)](https://blogs.opentext.com/wp-content/uploads/2024/05/shutterstock_322068299-1200x675-1-341x192.png)
Unlocking insights: highlights from the 2024 Verizon Data Breach Investigations Report (DBIR)
It’s time for the 2024 Verizon Data Breach Investigations Report (DBIR)! If you aren’t familiar with DBIR, provides invaluable insights into the evolving landscape of…
• 5 minute read
![Elevate human potential with Cloud Editions (CE) 24.2](https://blogs.opentext.com/wp-content/uploads/2023/07/Blog-Muhi-1200x675-1-341x192.jpg)
Elevate human potential with Cloud Editions (CE) 24.2
Latest innovations revealed at OpenText World Europe 2024
• 10 minute read
![Transforming digital forensic investigations](https://blogs.opentext.com/wp-content/uploads/2024/03/gettyimages-1054713428-1200x675-1-341x192.png)
Transforming digital forensic investigations
In the modern landscape of digital forensics, investigators must navigate many challenges stemming from the exponential growth of digital data.
• 4 minute read
![Navigating the Intersection of AI and Financial Risk: A Proactive Approach](https://blogs.opentext.com/wp-content/uploads/2024/04/shutterstock_2309488491-1200x675-1-341x192.png)
Navigating the Intersection of AI and Financial Risk: A Proactive Approach
Don’t miss out on the opportunity to transform your organization’s approach to data security, privacy, and governance in the age of GenAI.
• 3 minute read
![Cybersecurity Services combat an APT with NDR](https://blogs.opentext.com/wp-content/uploads/2024/03/shutterstock_1942178848-1200x675-1-341x192.png)
Cybersecurity Services combat an APT with NDR
Attackers linked to Iran and China are actively targeting critical infrastructure. Both the U.S. Environmental Protection Agency and National Security Agency have requested that each…
• 4 minute read
![The Change Healthcare Cyberattack: A Wake-Up Call for Healthcare Cybersecurity](https://blogs.opentext.com/wp-content/uploads/2024/03/shutterstock_1612695883-1200x675-1-341x192.png)
The Change Healthcare Cyberattack: A Wake-Up Call for Healthcare Cybersecurity
The attack on Change Healthcare is a pivotal moment for healthcare cybersecurity.
• 3 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.